USENIX Security '22 | PrivGuard: Privacy Regulation Compliance Made Easier | Lun Wang, Usmann Khan, Joseph Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song |
USENIX Security '22 | DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly | Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin |
USENIX Security '21 | Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards | Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy |
USENIX Security '21 | YARIX: Scalable YARA-based Malware Intelligence | Michael Brengel, Christian Rossow |
USENIX Security '21 | Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service | Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn |
USENIX Security '21 | Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs | Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama |
USENIX Security '21 | Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage | Mohammad Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, Elena Zheleva |
USENIX Security '21 | The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle | Omar Alrawi, Charles Lever, Kevin Valakuzhy, Ryan Court, Kevin Snow, Fabian Monrose, Manos Antonakakis |
USENIX Security '21 | Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance | Patricia Arias-Cabarcos, Thilo Habrich, Karen Becker, Christian Becker, Thorsten Strufe |
USENIX Security '21 | MAZE: Towards Automated Heap Feng Shui | Yan Wang, Chao Zhang, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou |
USENIX Security '21 | SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting | Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang |
USENIX Security '21 | Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt | Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal |
USENIX Security '21 | Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs | Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem |
USENIX Security '21 | Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries | Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi |
USENIX Security '21 | WaveGuard: Understanding and Mitigating Audio Adversarial Examples | Shehzeen Hussain, Paarth Neekhara, Shlomo Dubnov, Julian McAuley, Farinaz Koushanfar |
USENIX Security '21 | Using Amnesia to Detect Credential Database Breaches | Ke Coby Wang, Michael K. Reiter |
USENIX Security '21 | Undo Workarounds for Kernel Bugs | Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin |
USENIX Security '21 | SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript | Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi |
USENIX Security '21 | ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications | Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos |
USENIX Security '21 | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction | Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee |
USENIX Security '21 | What's in a Name? Exploring CA Certificate Control | Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey |
USENIX Security '21 | PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop | Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert |
USENIX Security '21 | Graph Backdoor | Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang |
USENIX Security '21 | Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses | Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom |
USENIX Security '21 | Swivel: Hardening WebAssembly against Spectre | Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan |